会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 21. 发明申请
    • STRONG RIGHTS MANAGEMENT FOR COMPUTING APPLICATION FUNCTIONALITY
    • 计算应用功能的强权管理
    • US20120246740A1
    • 2012-09-27
    • US13069271
    • 2011-03-22
    • Marc J. BrookerDavid BrownChristopher Richard Jacques de Kadt
    • Marc J. BrookerDavid BrownChristopher Richard Jacques de Kadt
    • G06F21/24
    • G06F21/629G06F21/121G06F2221/2115H04L63/20
    • Illegal, unauthorized, uncompensated and/or under-compensated utilization of computing application functionality may be mitigated at least in part by controlling access to executable instructions that implement the computing application functionality. The executable instructions may be executed by a set of one or more virtual machines provisioned by a multi-tenant virtual resource provider. The virtual resource provider may provision the virtual machines and other virtual resources with a set of implementation resources managed by a control plane of the virtual resource provider. The control plane may perform a number of control functions for the virtual resource provider including management and enforcement of virtual resource access policies such as one or more policies collectively specifying that the computing application functionality is to be accessed in accordance with a license or agreement between a third party provider or vendor of the computing application functionality and a user of the computing application functionality.
    • 至少部分地通过控制对实现计算应用功能的可执行指令的访问来减轻对计算应用功能的非法,未授权,未补偿和/或欠补偿的利用。 可执行指令可以由由多租户虚拟资源提供商提供的一个或多个虚拟机的集合来执行。 虚拟资源提供者可以为虚拟机和其他虚拟资源提供由虚拟资源提供者的控制平面管理的一组实现资源。 控制平面可以为虚拟资源提供者执行多个控制功能,包括虚拟资源访问策略的管理和执行,例如一个或多个策略,共同指定计算应用功能将根据许可证或协议 计算应用功能的第三方供应商或供应商以及计算应用功能的用户。
    • 25. 发明授权
    • Anti-theft tag
    • 防盗标签
    • US07772982B2
    • 2010-08-10
    • US11800103
    • 2007-05-04
    • Jeffrey A FeibelmanDavid Brown
    • Jeffrey A FeibelmanDavid Brown
    • G08B13/14
    • E05B73/0017G08B13/2434
    • An anti-theft tag includes a body that carries an EAS sensor, a shrinkable sleeve disposed about the outside of the body, an adhesive material disposed on the body between the body and the sleeve, and a sleeve holder extending from the body. The sleeve holder is constructed and arranged to hold the sleeve on the body such that a portion of the sleeve and the body define an aperture configured to receive an elongate article, such as an arm from a pair of eyeglasses. In use, once the anti-theft tag is disposed on the article, an assembler shrinks the sleeve to secure the anti-theft tag to the arm. In such a configuration, the sleeve and adhesive material holds the body of the anti-theft tag against the arm, thereby limiting the ability for a thief to remove the anti-theft tag from the elongate article by twisting or rotating the anti-theft tag relative to the article.
    • 防盗标签包括承载EAS传感器的主体,围绕主体外侧设置的可收缩套筒,设置在主体和套筒之间的主体上的粘合材料以及从主体延伸的套筒保持架。 套筒保持器被构造和布置成将套筒保持在主体上,使得套筒和主体的一部分限定了一个孔,该孔构造成从一对眼镜接收诸如臂的细长物品。 在使用中,一旦将防盗标签设置在物品上,装配商收缩套筒以将防盗标签固定到手臂上。 在这种构造中,套筒和粘合剂材料将防盗标签的主体抵靠在手臂上,从而通过扭转或旋转防盗标签来限制小偷从细长制品中移除防盗标签的能力 相对于文章。
    • 27. 发明授权
    • System and method for making correlation measurements utilizing pulse shape measurements
    • 使用脉冲形状测量进行相关测量的系统和方法
    • US07738606B2
    • 2010-06-15
    • US11088357
    • 2005-03-24
    • Ian WilliamsonDavid Brown
    • Ian WilliamsonDavid Brown
    • H04L1/02
    • H04B1/7085
    • A receiver utilizes an array of complex accumulation registers to form an image of the average chip shape or, as appropriate, chip edge shape, of the received signal over a specified period of time as a time series of complex power measurements. The receiver divides the length of the chip into a plurality of ranges, or bins, and, as appropriate, extends the bins to cover additional chips or portions thereof. When a sample is taken, the receiver enables the respective registers that are associated with the corresponding bin or bins, and the respective registers then accumulates the associated power measurement. The receiver uses the accumulated measurements from selected registers and/or selected groups of registers, to produce the correlation values that are needed to perform one or more correlation techniques and/or one or more multipath mitigation techniques. As appropriate, the sizes and/or starting points of the bins, and/or the selections of the bins for the various groupings may be altered, to change the spacings, locations, and so forth to which correlation values correspond.
    • 接收机利用复数累加寄存器的阵列来形成平均码片形状的图像,或者在适当的时候,在指定的时间段内形成接收信号的码片边缘形状,作为复杂功率测量的时间序列。 接收器将芯片的长度划分成多个范围或箱,并且适当地,扩展箱以覆盖附加的芯片或其部分。 当采样时,接收机启用与相应的箱或箱相关联的相应寄存器,并且相应的寄存器然后累积关联的功率测量。 接收机使用来自所选择的寄存器和/或所选择的寄存器组的累积测量值来产生执行一个或多个相关技术和/或一个或多个多径抑制技术所需的相关值。 适当地,可以改变箱的尺寸和/或起点,和/或用于各种组的箱的选择,以改变相关值对应的间隔,位置等。
    • 29. 发明授权
    • Bifurcate buffer
    • 分叉缓冲液
    • US07716398B2
    • 2010-05-11
    • US12004500
    • 2007-12-20
    • David Brown
    • David Brown
    • G06F3/00G11C7/10
    • H04J3/047
    • A buffer includes a plurality of serial inputs, a plurality of de-serializers, each coupled to a respective input, a plurality n of buffers and a media access controller having inputs coupled to the plurality of de-serializers, data outputs coupled to the buffers, and two control outputs coupled to respective buffers for buffering input data at a clock rate one-nth that of the input data. Preferably the buffer is a bifurcate buffer. In operation, serial packets are received on a port. They must be converted to parallel data for processing by conventional CMOS logic, however there are limits serial to parallel conversion ratio. This buffer describe circumvents theses limits.
    • 缓冲器包括多个串行输入,多个解串器,每个耦合到相应的输入,多个n个缓冲器以及具有耦合到多个解串器的输入的媒体访问控制器,耦合到缓冲器的数据输出 以及耦合到相应缓冲器的两个控制输出,用于以输入数据的输入数据的1/0的时钟速率缓冲输入数据。 优选地,缓冲液是分叉缓冲液。 在操作中,端口上接收到串行数据包。 它们必须转换为并行数据,以便通过常规CMOS逻辑进行处理,但串行到并行转换比率有限制。 这个缓冲区描述了这些限制。
    • 30. 发明授权
    • Anti-theft ring tag
    • 防盗环标签
    • US07714721B1
    • 2010-05-11
    • US12014287
    • 2008-01-15
    • Jeffrey FeibelmanDavid Brown
    • Jeffrey FeibelmanDavid Brown
    • G08B13/14
    • G09F3/14G08B13/2434G09F3/0329G09F3/0335
    • An anti-theft tag deterring theft of a ring is provided. The anti-theft tag includes an elongated housing for accommodating an EAS marker, a product support member that locks into the housing and which supports the ring, and a flexible, tear resistant strap for securing the ring to the support member, the strap being disposed at least partially within the housing during use. In one embodiment, the support member includes an arcuate seat portion for supporting a circular shank portion of the ring, and a locking member that locks into a corresponding cavity in the housing. In use, the tear resistant strap extends over the ring shank, and the strap ends are received within the cavity of the housing to protect the strap from unauthorized removal by a consumer.
    • 提供防盗环的防盗标签。 防盗标签包括用于容纳EAS标记的细长壳体,锁定到壳体中并且支撑环的产品支撑构件以及用于将环固定到支撑构件的柔性防撕裂带,所述带被设置 在使用期间至少部分地在壳体内。 在一个实施例中,支撑构件包括用于支撑环的圆形柄部分的弓形座部分,以及锁定在壳体中的对应空腔中的锁定构件。 在使用中,防撕裂带延伸到环形柄上,并且带端部容纳在壳体的空腔内,以保护带免遭消费者的非法移除。